Results 211 to 220 of about 268,998 (233)
Some of the next articles are maybe not open access.

Managing Identities

1994
Abstract Sociologist Erving Goffman describes a stigma as “an attribute that is deeply discrediting,” a social status that marks those who carry it as being “of a less desirable kind,” or an associated condition that transforms its owner “from a whole and usual person to a tainted, discounted one.”1 Certainly many of the people in our
Martin S Weinberg   +2 more
openaire   +1 more source

Managing one's social identity: Successful and unsuccessful identity management

European Journal of Social Psychology, 2014
AbstractThis work explores the motivational dynamics of social identity management. Following social identity theory, we hypothesized that a threat to a positive social identity elicits specific negative emotions (i.e., outgroup‐directed anger) and motivates identity management.
Sarah E. Martiny, Thomas Kessler
openaire   +1 more source

Identity management systems

IEEE Potentials, 2008
Most organizations have difficulty keeping track of and controlling all the user identifiers and passwords across their systems. Identity management (IdM) systems are designed to help manage user identifiers across multiple systems as well as providing a way to manage user access over their lifecycle of roles in the organization.
openaire   +1 more source

Sex offenders’ identities and identity management

2013
The term ‘sex offender’ ignites a highly emotive response. Depictions of the ‘predatory sex offender’ and the ‘anonymous stranger’ who abducts, rapes and kills women and children renders all convicted sexual offenders as ‘outcasts’ (Farrell and Soothill 2001; McCartan 2010; Sampson 1994; Silverman and Wilson 2002; Soothill and Walby 1991; Young 2004 ...
openaire   +1 more source

Oracle Identity Management and Identity Stores

2016
Many organizations have multiple identity stores to support various business units and processes. These identity stores might be in the form of Lightweight Directory Access Protocol (LDAP)-compatible directories, database tables, or other formats. In many cases, Oracle Identity Manager (OIM) can be used to manage these various directory formats using ...
openaire   +1 more source

Regulating Identity Management

2011
Kosta, E.   +3 more
openaire   +2 more sources

Identity Management Systems

2011
Next, we discuss the practicality of identity management systems, and consider how their practicality can be enhanced by developing reliable integration and delegation schemes. We also provide overviews of the Project Concordia integration framework, and the Shibboleth and OAuth delegation frameworks, as well as reviewing the related literature.
openaire   +1 more source

Digital Identity Management

2015
This book that involves many contributors deals with Digita Identity in terms of dedicated management systems, privacy and authentication. It also highlights the management of digital identities and attributes in the context of Cloud computing.
Laurent, Maryline, Bouzefrane, Samia
openaire   +1 more source

Identity Management

2018
Michael Schwartz, Maciej Machulak
openaire   +1 more source

Home - About - Disclaimer - Privacy